Message Trace

Source: Wireshark

Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\rogue\rogue_assoc_wlan.pcapng

Messages: 10

[00001] Frame 1 — 🔍 Probe Request (0x0004)

⏱️ 2017-02-11T13:15:45.719282Z
📱 iPhone Client ➜ 📢 Broadcast
Loading packet tree...

[00002] Frame 2 — 📋 Probe Response (0x0005)

⏱️ 2017-02-11T13:15:45.719971Z
📡 Rogue AP ➜ 📱 iPhone Client
Loading packet tree...

[00003] Frame 3 — 🔐 Authentication (0x000b)

⏱️ 2017-02-11T13:15:45.729582Z
📱 iPhone Client ➜ 📡 Rogue AP
Loading packet tree...

[00004] Frame 4 — ✅ ACK (0x001d)

⏱️ 2017-02-11T13:15:45.729588Z
📱 iPhone Client ➜ 📱 iPhone Client
Loading packet tree...

[00005] Frame 5 — 📡 Beacon frame (0x0008)

⏱️ 2017-02-11T13:15:45.74938Z
📡 Rogue AP ➜ 📢 Broadcast
Loading packet tree...

[00006] Frame 6 — 🔐 Authentication (0x000b)

⏱️ 2017-02-11T13:15:45.749393Z
📡 Rogue AP ➜ 📱 iPhone Client
Loading packet tree...

[00007] Frame 7 — 📡 Association Request (0x0000)

⏱️ 2017-02-11T13:15:45.749694Z
📱 iPhone Client ➜ 📡 Rogue AP
Loading packet tree...

[00008] Frame 9 — ✅ Association Response (0x0001)

⏱️ 2017-02-11T13:15:45.754612Z
📡 Rogue AP ➜ 📱 iPhone Client
Loading packet tree...

[00009] Frame 10 — 📦 QoS Data (0x0028)

⏱️ 2017-02-11T13:15:45.755141Z
📡 Rogue AP ➜ 📱 iPhone Client
Loading packet tree...

[00010] Frame 11 — 💤 Null function (No data) (0x0024)

⏱️ 2017-02-11T13:15:45.770329Z
📱 iPhone Client ➜ 📡 Rogue AP
Loading packet tree...